General
-
Target
file.exe
-
Size
222KB
-
Sample
231101-rl9mysfa6z
-
MD5
e388c54a173e4d45495d51e26164ae6a
-
SHA1
50e20cca7502795e5f0458977df9f78777c9b9a0
-
SHA256
c796f0643d421491278d4d27f14f6707cacaacf1c34b5c35f61d4f4f7d39c074
-
SHA512
798c56f77d2c1bee5dbd04895b2fb68e1ed05096c740c96de8560fb76381816f4bf75dc4461a6275e009231266c653b4b1b9279f4ad3376021f20539ffb21925
-
SSDEEP
3072:afKoS0pZM9FPRqgri16FVUlvsrUNBhzZ+RcWs4watIEc4ULjguk:Xos9FPA6FeFbNGch4BvULEv
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
Malware Config
Extracted
stealc
Targets
-
-
Target
file.exe
-
Size
222KB
-
MD5
e388c54a173e4d45495d51e26164ae6a
-
SHA1
50e20cca7502795e5f0458977df9f78777c9b9a0
-
SHA256
c796f0643d421491278d4d27f14f6707cacaacf1c34b5c35f61d4f4f7d39c074
-
SHA512
798c56f77d2c1bee5dbd04895b2fb68e1ed05096c740c96de8560fb76381816f4bf75dc4461a6275e009231266c653b4b1b9279f4ad3376021f20539ffb21925
-
SSDEEP
3072:afKoS0pZM9FPRqgri16FVUlvsrUNBhzZ+RcWs4watIEc4ULjguk:Xos9FPA6FeFbNGch4BvULEv
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-